Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
Do you receive a code via SMS message, email or voice call to sign into your bank account? This security method is no longer considered very secure.
The technologies change, but the challenge remains the same: How can a digital system authenticate an analog human’s identity?
You can log in to your smartphone by talking to it. Current security systems don’t protect enough against imitators. The best way to ensure voice authentication is secure is to start with the sound.
Already becoming a darling of Wall Street, blockchain technology's biggest real benefits could come to the world's poorest people. Here's how.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
The conviction of two men in relation to the sale of forged Brett Whiteley paintings indicates that Australia needs to get its act together when it comes to authenticating artworks.
If our homes and property are protected from the law, by the law, then our digital devices should be, too.
President Obama’s call for better electronic gun-safety systems put a spotlight on the technologies currently in the R&D pipeline that aim to make sure only authorized users can fire a gun.
No matter how many times people are warned to set strong secure passwords, many don’t. So why do people take the risk? And is there anything else they can do to be more secure online?
Invisible under normal light but fluorescent under UV light, this ink can print out unique signatures that use ‘molecular encryption’ to authenticate anything they tag.